Method for preventing hot spot from being illegally used
A technology of hotspot and encryption method, applied in the direction of user identity/authority verification, security device, digital transmission system, etc., can solve the problem of fraudulent use of hotspot, and avoid fraudulent use.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0028] In order to describe in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments.
[0029] This embodiment provides a method for avoiding fraudulent use of hotspots, which is applied between a client, a hotspot, and an authentication server. The client may be a mobile phone or a notebook client. Hotspots have a unique first encryption method, unique means that they are different from other hotspots, and can be uniquely associated through the identification information of hotspots. The authentication server stores a first decryption method corresponding to the first encryption method.
[0030] The method comprises the following steps: the client prohibits other applications from communicating with the wifi module; The wifi module communicates with external programs. There are many ways for the client to prohibit other applications from comm...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More